13 research outputs found
Guide des procédures administratives concernant les infrastructures de l'Internet
5 pages (English), 22 paginas (Español), 6 pages (Français)This document describes the administrative procedures for countries (or networks) seeking to
connect to the global Internet. This includes the steps and operations necessary for address
space allocation and registration, routing database registration, and domain name registration.
Where to find the required forms and instructions on how to complete them are included
Recommended from our members
Quantifying and Mapping the Digital Divide from an Internet Point of View
Quantitative knowledge of the magnitude, extent and trends of the Digital Divide are critical to understand and identify the regions most in need of help, to make rational decisions on how to address the problems and to make cases for executives, funding agencies and politicians. We report on a project (PingER) to measure the Digital Divide from the point of view of Internet performance. The PingER project has been measuring Internet performance since 1995 and with the increased emphasis on measuring and tracking the Digital Divide, it now covers over 700 hosts in over 150 countries that between them contain over 99% of the world's Internet connected population. In this paper we will describe the how PingER works, it deployment, the data analysis, and presentation. We also introduce a new PingER visualization tool (ViPER) that provides a more appealing interactive visualization of the PingER data and also works on mobile PDAs. We will also show results from PingER that illustrate the magnitude, extent and trends for the Digital Divide, and also compare PingER results with some human development and technology indices
Recommended from our members
Using Route Forwarding State to Identify Routing Errors in Mission-Critical, Military Data Networks
This research verified route forwarding state information from an example, mission-critical, military data network against a network architecture definition in order to aid inexperienced network administrators in identifying routing errors. Aiding inexperienced administrators is important because network administrators in the military vary widely in experience and it is more likely that mission-critical, military data networks are administered by people who lack experience.As part of this research, an Architecture Definition Language (ADL) was developed to specify physical topology and data-link attributes of a network. That architecture definition was then used to define a model of the network using graph theory tools. Next, a web-based visualization of the architecture model was developed that included an interactive form to evaluate the shortest path between subnetworks. The shortest path between subnetworks was calculated on the architecture model, inspected on the live network, and overlaid on the web-based visualization to depict the inconsistencies for an inexperienced network administrator.With the tool developed in this research, an experienced network administrator can use the developed ADL to describe how the network should work to network administrators at any experience level. Using the architecture definition, inexperienced network administrators can identify routing errors by visualizing how a live network compares to the architected network. Quickly identifying and resolving routing errors in mission-critical, military data networks enhances the operational effectiveness of the military
LDAP como suporte normalizado para mapas de descoberta
Tese de mestrado. Redes e Serviços de Comunicação. Faculdade de Engenharia. Universidade do Porto. 200
A framework for the application of network telescope sensors in a global IP network
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security system